
Cyber Security Vocabulary Review
Authored by Stephanie Smith
Other
Professional Development
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encryption is
a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.
the use of deception to trick somebody into sharing their personal information.
the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.
a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cyber Security can be defined as
a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.
the use of deception to trick somebody into sharing their personal information.
the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.
All of the above
None of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is
a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.
the use of deception to trick somebody into sharing their personal information.
the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.
a login method that only grants the user access after they have showed multiple credentials to verify their identity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multi-factor Authentication (MFA or 2FA)
a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.
the use of deception to trick somebody into sharing their personal information.
the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.
a login method that only grants the user access after they have showed multiple credentials to verify their identity
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social Engineering is
a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.
the use of deception to trick somebody into sharing their personal information.
the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.
the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing is
a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.
the use of deception to trick somebody into sharing their personal information.
the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.
a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?